September 27, 2010
Although it’s currently in the prototype phase, there is some hope on the horizon for those concerned with the far-off (but nonetheless quite unsettling) possibility of hypervisor attacks, which if successfully executed, would threaten the integrity of a shared virtualized environment.
Researchers from North Carolina State University and IBM have created a security tool that works in stealth mode to monitor for hypervisor attacks without attackers being aware that such a tool is in place. The software, called HyperSentry, functions outside of the hypervisor to examine, in real time, when and if the hypervisor has been attacked.
One of the lead researchers on the project, Dr. Peng Ning, claims that the tool measures a hypervisor’s integrity without the hypervisor knowing it’s being measured, which he claims offers some “peace of mind about the system’s integrity.”
Given the relative sophistication of malware it is possible for some of it to slip past current security monitoring tools and software that only sees the memory where the hypervisor is stationed and can then remain undetected by altering pieces of the CPU. HyperSentry actually has a view into the hypervisor and can see where it is located at all times, even if an attack has altered its location.
The possibility of hypervisor attacks is one of the more often-cited reasons why there is a great deal of concern about a multitenant environment, particularly for those who are considering taking their mission-critical applications outside of the firewall. Still, it is worth repeating that such attacks are very rare but, as Dr. Peng Ning reminded, “if there was one, the consequences would be quite serious. Think about Amazon with so many machines running and so many things being attacked.”
Full story at Dark Reading
Researchers from the Suddhananda Engineering and Research Centre in Bhubaneswar, India developed a job scheduling system, which they call Service Level Agreement (SLA) scheduling, that is meant to achieve acceptable methods of resource provisioning similar to that of potential in-house systems. They combined that with an on-demand resource provisioner to ensure utilization optimization of virtual machines.
Experimental scientific HPC applications are continually being moved to the cloud, as covered here in several capacities over the last couple of weeks. Included in that rundown, Co-founder and CEO of CloudSigma Robert Jenkins penned an article for HPC in the Cloud where he discussed the emergence of cloud technologies to supplement research capabilities of big scientific initiatives like CERN and ESA (the European Space Agency)...
When considering moving excess or experimental HPC applications to a cloud environment, there will always be obstacles. Were that not the case, the cost effectiveness of cloud-based HPC would rule the high performance landscape. Jonathan Stewart Ward and Adam Barker of the University of St. Andrews produced an intriguing report on the state of cloud computing, paying a significant amount of attention to the problems facing cloud computing.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.